Rossini saw Thorn’s impatient look and explained. “He’s right, Pete. Programmers are like other artists. They’ve each got their own styles and their own bags of little tricks favorite techniques they use to achieve specific ends. To somebody who knows how to read this stuff like Derek here, those are as good as fingerprints or signatures.”
Kettler was still engrossed in the machine code showing on his monitor. “God, Maestro, this is beautiful work! Whoever paid to have this little monster made sure went to the right place.”
Unable to contain himself any longer, Thorn cut in. “Much as I hate to break up this little mutual admiration session, can either of you tell me just who the hell this Bulgarian guy is?”
Rossini filled him in, with Kettler interjecting occasional comments.
Only a few viruses had ever been traced back to people with names. Several, the nastiest of a nasty breed, had been linked to a mysterious individual “the Bulgarian.”
Nobody knew his name, but detective work, much of it unofficial, had traced some viruses back to Bulgaria and to a master programmer working covertly there. Bulgaria’s secret service had always had an evil reputation. It had been involved in several assassinations, and even linked to an attempt on the life of the Pope. As a result, many in the computer world assumed the Bulgarian had originally been trained and paid by that country’s now-defunct communist government, probably as part of a plan to wreak havoc on the technologically advanced West. Whatever he had once been, it was now clear that the virus-maker was working as a cybermercenary selling his destructive wares to the highest bidders.
Kettler finished by saying, “Whoever made the deal for this program paid pretty dearly for it. There’s all kinds of gossip on the Net, the computer bulletin boards, about what the Bulgarian charges to do his thing including some pretty wild guesses. But I’d bet you’re talking at least a couple of million bucks to craft this baby, and probably a lot more.”
“Several million dollars?” Thorn raised an eyebrow and looked at Rossini. “You believe that a white racist group or a band of black radicals could raise that kind of cash without anybody hearing about it?”
“Not a chance. That has to be a government’s money,” Rossini said flatly. “Whichever it is, I’d say your theory is looking better and better. This campaign is being orchestrated from overseas.”
Kettler stared at both of them. “Let me get this straight. You guys think these terrorists are working for some foreign government?”
They nodded slowly.
“Wow.” Kettler shook his head. “Far freaking out. This’ll sure rock some boats on the Net.” He pawed through the diskettes on his desk and came up with a stack of four. “See these? That’s almost four megs of traffic on the terror wave alone. Practically everybody with a modem and two brain cells to knock together has his or her own theory about what’s going on.”
The computer expert slipped his diskettes back into place and shrugged.
“Between this terrorism shit and the code controversy, I’ve been on the Net almost constantly.” “Code controversy?” Thorn asked.
Rossini nodded. “Some government agencies wanted to restrict commercially available E-mail encryption programs to ones the government could break…”
“Hell, no, Maestro. Not that old gripe. That’s yesterday’s news,” Kettler interrupted. “This is a privacy issue deal. It broke out a couple of months ago when some guy started bitching about unbreakable, coded E-mail he’d spotted on CompuNet, one of the worldwide computer bulletin boards. Said he’d been intercepting a ton of scrambled posts from somewhere in England to a bunch of users scattered across the country all using an encryption program he’d never seen before. Boy, did that set off fireworks!”
The computer expert smiled at the memory. “Geez, you should have read all the screaming about the sanctity of private electronic mail, and the First Amendment, and all the usual shit…”
“Hold it,” Thorn broke in, his mind racing in high gear. Two or three months ago? The timing could be coincidence, but he’d been wondering how the terrorists coordinated their attacks. Were they using computer hookups to communicate? He looked down at the younger man. “Are you saying someone has spotted coded messages coming from a foreign source to people here in the U.S.?”
“Yeah,” Kettler answered with a nonchalant shrug, “and as far as I’m concerned, they can put them in left-handed Swahili. I don’t give a rat’s ass. I’m just getting a kick seeing how loud all the Net prudes squawk about it.”
Thorn took a step closer and spoke slowly, intensely. “You’re missing the point. We’ve got terrorist attacks going on right and left, and now you’re telling me someone’s been intercepting coded messages?”
Kettler nodded, a little taken aback, but starting to understand.
“Yeah. But that’s not necessarily unusual. A lot of Email these days is PEM, privacy-enhanced E-mail. It’s just that these messages are using a real high level encryption program nobody’s ever heard of.” He shook his head. “Like I said, a bunch of us have been arguing the issue on some of the Net forums. It’s not general knowledge. Cripes, if CompuNet or any of the other public bulletin boards knew that someone was routinely breaking into their private message files, they’d have a conniption fit.”
Thorn cut him off sharply. “I don’t give a goddamn about the legalities, Mr. Kettler.” He leaned forward, towering over the openmouthed computer expert. “Do you know the person who’s been making those interceptions?”
“Only by his handle. He calls himself ‘Freebooter,’ ” Kettler replied hesitantly. “He’s a real top-gun hacker. He’s a little strange.”
Thorn didn’t say anything, though his mind reeled slightly at the thought that the computer expert could find anyone else odd.
Rossini joined in. “Can we contact this guy, Derek?”
“I can dial him up, I guess. I know where he usually hangs out in cyberspace.” Kettler absentmindedly scratched his beard. “Freebooter won’t talk to you directly, though, Maestro. You work for the Man.” He didn’t even mention Thorn.
“Whatever. Just do it.” Rossini almost pushed Kettler into his chair.
“Do you think he’ll be there?”
Kettler nodded, typing fast again. “Freebooter’s always there. He practically lives on the Net.”
The strange lines of machine code vanished as he shunted back to the CPU he had dedicated solely to monitoring the computer bulletin boards.
A speaker suddenly spat out a dial tone, followed by the sound of a number being punched in at high speed. The screen flickered and then blinked into another image. This one showed a rippling black flag emblazoned with a white skull and crossbones. Bold text letters spelled out: WELCOME TO THE PIRATES’ COVE.
Kettler looked apologetic. “It’s a hacker’s BBS. I like to keep my ear to the ground here… you know, just kind of see what’s new.” He bent over the keyboard again, fingers flashing through long-practiced combinations as he logged on and called up a list of those currently on-line. He leaned closer, scrolling through the names and then nodded sharply. “There he is!”
Thorn focused on the list and saw it. A line read: FREEBOOTER, IN THE TAVERN.
The computer expert punched a few more keys and leaned back. “Okay, he’s chatting with someone else right now, but I just paged him.” “Good,” Thorn said simply. “Now, you know what we want?”
Kettler nodded rapidly. “Yeah. A data dump of every encrypted message he’s collected, right?”
“Right.”
“Okay,” Kettler said. “Listen, Lemme work on him for a while. This could be kinda tricky. Freebooter’s a touchy bastard. If we screw this up or he gets spooked, he’ll drop off the Net, change his handle, and then we’ll never find him.”